Chapter 4: The Medium Access Layer
|
|
- Delilah Pearson
- 6 years ago
- Views:
Transcription
1 Chapter 4: The Medium Access Layer Computer Networks Maccabe Computer Science Department The University of New Mexico September 2002
2 Medium Access Layer Point-to-point versus broadcast networks Broadcast multiaccess channels random access channels Arbitrate contention General coverage of LANs Chapter 4 p.2/69
3 Topics Arbitrating access to broadcast networks Channel Allocation Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth Data Link Layer Switching Chapter 4 p.3/69
4 Channel Allocation Static Allocation FDM and TDM are examples of static allocation Traffic is bursty, mean to peak ratio of 1:1000 Mean delay: where T 1 µc λ C is channel capacity in bps λ is arrival rate in frames/sec 1 µ is the mean frame length in bits/frame µc is the service rate Replace channel with N C 1 T FDM µ C N λ N bps channels N N µc λ NT Chapter 4 p.4/69
5 Channel Allocation Dynamic Allocation Station Model: N independent stations probability of frame generation in interval t is λ t station blocks until frame is transmitted Single Channel no external channels Collision simultaneous transmission results in garbled signal Time Continuous Slotted time is divided into discrete intervals Carrier No sense channels transmit then look for collisions Sense stations wait while channel is busy frame transmission can start at any time Chapter 4 p.5/69
6 Topics Arbitrating access to broadcast networks Channel Allocation Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth Data Link Layer Switching Chapter 4 p.6/69
7 MAC Protocols ALOHA Carrier Sensed Multiple Access (CSMA) Collision-Free Protocols Limited-Contention Protocols (skip) Wavelength Division Multiple Access Protocols (skip) Wireless LAN Protocols Chapter 4 p.7/69
8 ALOHA Pure ALOHA Stations transmit and look for collisions (could wait for ACKs if unable to listen while transmitting) Random time for backoff (avoids lockstep) User A B C D E Time Chapter 4 p.8/69
9 ALOHA Efficiency Let t be the time to transmit a frame Vulnerable period for a frame is 2t Collides with the start of the shaded frame t Collides with the end of the shaded frame t o t o + t t o + 2t t o + 3t Time Vulnerable Chapter 4 p.9/69
10 ALOHA Efficiency Let G be the mean transmissions (old and new) per frame time Probability of k frames generated during a frame time is: G k e G Pr[k] k! 2G frames in an interval of length 2t Throughput is (offered load times probability of no collisions) S Ge 2G Chapter 4 p.10/69
11 ALOHA Efficiency S (throughput per frame time) 0.40 Slotted ALOHA: S = Ge G Pure ALOHA: S = Ge 2G G (attempts per packet time) Chapter 4 p.11/69
12 ALOHA Slotted Can only start at the beginning of a slot Reduces vulnerability by 1/2 S Probability of a collision is 1 e G Probability of requiring k attempts P k e G 1 e G Expected number of transmissions k 1 Ge G E k 1kP k k 1 ke G 1 e G k 1 e G Chapter 4 p.12/69
13 Carrier Sense Multiple Access 1-persistent: sense, when free transmit propagation delay nonpersistent: slotted, random delay when slot busy p-persistent: transmit with probability p when slot is idle S (throughput per packet time) Pure ALOHA Slotted ALOHA 0.5-persistent CSMA 1-persistent CSMA 0.01-persistent CSMA Nonpersistent CSMA 0.1-persistent CSMA G (attempts per packet time) Chapter 4 p.13/69
14 CSMA with Collision Detection (CSMA/CD) Early transmission abort Random backoff Bounding the contention interval (2τ, where τ is propagation delay) t o Contention slots Frame Frame Frame Frame Transmission period Contention period Time Idle period Chapter 4 p.14/69
15 Collision-Free 1-bit reservation 8 Contention slots Frames 8 Contention slots 1 d issue: 1 bit per station Making the overhead logarithmic Bit time Result Stations 0010 and 0100 see this 1 and give up Station 1001 sees this 1 and gives up Chapter 4 p.15/69
16 Wireless LAN CSMA Hidden station (a C better not send to B) Exposed station (b C could send to D) A B C D A B C D Radio range (a) (b) Chapter 4 p.16/69
17 Wireless LAN Avoidance RTS / CTS Range of A's transmitter Range of B's transmitter C A RTS B D C A CTS B D E E (a) (b) Chapter 4 p.17/69
18 Topics Arbitrating access to broadcast networks Channel Allocation Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth Data Link Layer Switching Chapter 4 p.18/69
19 Ethernet Cabling Manchester Encoding MAC Sublayer Protocol Binary Exponential Backoff Performance Switched Ethernet Fast Ethernet Gigabit Ethernet Logical Link Control Retrospective Chapter 4 p.19/69
20 Ethernet Cabling Common Kinds of Cable 10Base5 vampire taps 10 Mbps, Baseband signaling, 500 meters 10Base2: BNC connectors Name Cable Max seg N/seg Advantages 10Base5 Thick coax 500 m 100 Original; now obsolete 10Base2 Thin coax 185 m 30 No hub 10Base-T Twisted pair 100 m 1024 Cheapest 10Base-F Fiber optics 2000 m 1024 Best between buildings Chapter 4 p.20/69
21 Ethernet Cabling Illustrating Kinds of Cable Controller Core Controller Transceiver cable Vampire tap Transceiver + controller Twisted pair Transceiver Connector Hub (a) (b) (c) (a) 10Base5, (b) 10Base2, (c) 10Base-T Chapter 4 p.21/69
22 Ethernet Cabling Cable Topologies A B C A B C D Tap D Repeater Backbone (a) (b) (c) (d) (a) Linear, (b) Spine, (c) Tree, (d) Segmented Chapter 4 p.22/69
23 Ethernet Manchester Encoding Transition on every bit, clock recovery Basic: 1 is high to low; 0 is low to high Differential: 0 has a transition at the start Requires 2x bandwidth +.85V, -.85V Bit stream (a) Binary encoding (b) Manchester encoding (c) Differential Manchester encoding Transition here indicates a 0 Lack of transition here indicates a 1 Chapter 4 p.23/69
24 Ethernet MAC Sublayer Protocol Frame Formats Bytes (a) Preamble Destination address Source address Type Data Pad Check- sum Destination Source (b) Preamble Length Data Pad address address Check- sum (a) DIX (Digital, Intel, Xerox) Ethernet, (b) IEEE Chapter 4 p.24/69
25 Ethernet Frame DIX Preamble: (* 8) 10-MHz square wave for 6.4 µsec Destination and Source addresses: 2 or 6 bytes (only 6 is used) Group addresses msb is 1 Broadcast all 1 s Bit 46 is used for local versus global address 48 2 bits for global addresses Types field specifies the upper level protocol Data 1500 byte maximum die to memory costs Pad: to ensure minimum length Checksum: CRC-32 Chapter 4 p.25/69
26 Ethernet MAC Sublayer Protocol Minimum Frame Size Packet starts Packet almost A B A B at time 0 at B at τ - (a) (b) A B A Noise burst gets back to A at 2τ B (c) Collision at time τ (d) Chapter 4 p.26/69
27 Ethernet MAC Sublayer Protocol Minimum Frame Size longest segment 500 m at most 4 repeaters maximum LAN length is 2500 m Maximum round-trip time is 50µsec 10 Mbps implies 100 nsec / bit, 500 bits takes 50 µsec uses 512 bits (64 bytes) as minimum frame size Chapter 4 p.27/69
28 Ethernet Binary Exponential Backoff Slots are defined to be 51.2µsec during contention period After i collisions, backoff random number of intervals between 0 and 2 i i is bounded at 10 after 16 attempts, the sender quits Intuition Assume that number of contending stations is small until proven otherwise if i were fixed at 1023, lots of unnecessary waiting if i were fixed at 1, potential for unbounded waiting 1 Chapter 4 p.28/69
29 Ethernet Performance Model Metcalfe and Boggs ignore binary exponential backoff and assume constant probability, p, of retransmission in each slot Probability that one station acquires a slot, A, is A kp 1 p k 1 where k p number of stations ready to transmit probability that a station will retransmit A is maximized when p is 1 k When p is 1 k, A 1 e as k Chapter 4 p.29/69
30 Ethernet Performance Size of Contention Window, w A A 1 j 1 is the probability that the contention window is j slots Mean number of slots per contention is: j 0 ja 1 Each slot is bounded by 2τ, so the mean window size is bounded by 2τ A Assuming optimal p (p 1 k), A 1 e and w A j 2τe 5 1 4τ 1 A Chapter 4 p.30/69
31 Ethernet Performance Efficiency Let P be the mean transmission time / frame Channel efficiency Let F B L c frame length bandwidth cable length speed of light P F B P P 2τ A and Channel efficiency As BL increases, efficiency decreases 1 1 2BLe cf Chapter 4 p.31/69
32 Ethernet Performance Efficiency 1.0 Channel efficiency byte frames 512-byte frames 256-byte frames 128-byte frames 64-byte frames Number of stations trying to send 2τ 51 2µsec, 10 Mbps Chapter 4 p.32/69
33 Switched Ethernet Connector Switch To hosts Ethernet Hub To hosts To hosts 10Base-T connection To the host computers collision domains Chapter 4 p.33/69
34 Fast Ethernet Cabling Name Cable Max seg Advantages 100Base-T4 Twisted pair 100 m Category 3 UTP 100Base-TX Twisted pair 100 m full duplex 100 Mbps category 5 100Base-TF Fiber optics 2000 m full duplex 100 Mpbs long runs Chapter 4 p.34/69
35 Gigabit Ethernet Ethernet Switch or hub Computer Ethernet (a) (b) (a) two-station Ethernet, (b) multistation Ethernet Chapter 4 p.35/69
36 Gigabit Ethernet It s not Ethernet Full duplex switched, no collisions not CSMA/CD segment length determined by signalling properties Half duplex hubs, collisions 100 times faster, 25 meter maximum length carrier extension hardware pad to 512 bytes (9% efficiency) frame bursting sender sends combined packets up to 512 bytes Chapter 4 p.36/69
37 Gigabit Ethernet Cabling Name Cable Max seg Advantages 1000Base-SX Fiber optics 550 m Multimode fiber (50, 62.5 microns) 1000Base-LX Fiber optics 5000 m Single (10µ) or multimode (50, 60.5 µ) 1000Base-CX 2 pairs of STP 25 m Shielded twisted pair 1000Base-T 4 pairs of UTP 100 m Standard cat 5 UTP Chapter 4 p.37/69
38 IEEE 802.2: Logical Link Control Network layer Packet Data link layer LLC MAC MAC LLC LLC Packet Packet MAC Physical layer Network (a) (b) (a) Position of LLC, (b) Protocol formats Chapter 4 p.38/69
39 Ethernet Retrospective Simple cheap, reliable, and easy to mainain Evolution Chapter 4 p.39/69
40 Topics Arbitrating access to broadcast networks Channel Allocation Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth Data Link Layer Switching Chapter 4 p.40/69
41 Protocol Stack Upper layers MAC sublayer Logical link control Data link layer Infrared FHSS DSSS a OFDM b HR-DSSS g OFDM Physical layer Chapter 4 p.41/69
42 Physical Layer a OFDM Othogonal Frequency Division Multiplexing up to 54 Mbps 52 frequencies: 48 for data, 4 for synchronization b HR-DSSS High Rate Direct Sequence Spread Spectrum 1, 2, 5.5, and 11 Mbps 7 times the range of a g (enhanced b) Chapter 4 p.42/69
43 MAC Sublayer Protocol Hidden and Exposed stations Radios are half duplex (can t listen while sending) Modes DCF Distributed Coordination Function PCF Point Coordination Function base station, polls for frames to send beacon frame CSMA/CA Chapter 4 p.43/69
44 Hidden and Exposed Stations A wants to send to B but cannot hear that B is busy Range of C's radio B wants to send to C but mistakenly thinks the transmission will fail Range of A's radio A B C A B C C is transmitting A is transmitting (a) (b) Chapter 4 p.44/69
45 Virtual Channel Sensing A RTS Data B CTS ACK C NAV D NAV Time Chapter 4 p.45/69
46 Fragment Burst Errors are related to fragment length Fragment burst A RTS Frag 1 Frag 2 Frag 3 B CTS ACK ACK ACK C NAV D NAV Time Chapter 4 p.46/69
47 Combining PCF and DCF Control frame or next fragment may be sent here SIFS PIFS DIFS PCF frames may be sent here DCF frames may be sent here Bad frame recovery done here EIFS ACK Time Chapter 4 p.47/69
48 Protocol Stack Bytes Frame control Dur- ation Address 1 Address 2 Address 3 Seq. Address 4 Data Check- sum Bits Version Type Subtype 1 To DS From DS MF Re- try Pwr More W O Frame control Chapter 4 p.48/69
49 Topics Arbitrating access to broadcast networks Channel Allocation Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless (skip) Bluetooth Data Link Layer Switching Chapter 4 p.49/69
50 Topics Arbitrating access to broadcast networks Channel Allocation Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth (skip) Data Link Layer Switching Chapter 4 p.50/69
51 Topics Arbitrating access to broadcast networks Channel Allocation Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth Data Link Layer Switching Chapter 4 p.51/69
52 Bridging LANs Example Bridge Backbone LAN B B B B File server Cluster on a single LAN Work- station LAN Chapter 4 p.52/69
53 Bridging LANs Reasons Autonomy: partitioning reflects political boundaries Geography: partitioning reflects geographic distance Load: partition to isolate load Distance: further than 2500 meters Reliability: limit the effect of a bad node Security: limit the spread of sensitive information (promiscuous mode) Chapter 4 p.53/69
54 Data Link Layer Switching Bridges from 802.x to 802.y Local Internetworking Spanning Tree Bridges Remote Bridges Repeaters, Hubs, Bridges, Switches, Routers, and Gateways Virtual LANs Chapter 4 p.54/69
55 Bridges from 802.x to 802.y Bridge Function Host A Host B Network Pkt Bridge Pkt LLC Pkt Pkt Pkt MAC Pkt Pkt Pkt Pkt Physical Pkt Pkt Pkt Pkt Wireless LAN Pkt Pkt Ethernet Chapter 4 p.55/69
56 Bridges from 802.x to 802.y Issues Different frame formats Destination Source Length Data Pad address address Check- sum Frame Dur- Address Address Address Address Seq. Data control ation Check- sum Header E C Type EK Length Connection ID Data C I CRC Check- sum Different data rates 100 Mbs to 11 Mbps many to one Chapter 4 p.56/69
57 Bridges from 802.x to 802.y Issues (continued) Different maximum frame sizes frames arrive in one piece or they don t no provision for fragmenting and reassembling frames MTU lacks transparency Security encryption on wireless, but not on Ethernet encrypt at higher layers Quality of service Chapter 4 p.57/69
58 Local Internetworking Transparent bridging of Local Ethernets F G H Bridge LAN 4 A B B1 C B2 D E LAN 1 LAN 2 LAN 3 For each frame, bridge decides to forward or discard Routing table in each bridge, local knowledge only Backward learning with decay Chapter 4 p.58/69
59 Spanning Tree Bridges Issue Multiple bridges in parallel Routing loops Frame copied by B1 Frame copied by B2 LAN 2 F 1 F 2 B1 Bridge B2 LAN 1 F Initial frame Build a tree, avoid loops, but ignore some possible links Chapter 4 p.59/69
60 Spanning Tree Bridges Sample Solution A B C A B C LAN D E F LAN D E F G Bridge H I J Bridge that is part of the spanning tree 5 6 H J Bridge that is not part of the spanning tree 8 9 (a) (b) Chapter 4 p.60/69
61 Spanning Tree Bridges Building the Tree Selecting a root node broadcast serial numbers select bridge with lowest serial number Construct a tree with shortest paths from root to every bridge Continue to run algorithm to detect changes in topology Chapter 4 p.61/69
62 Remote Bridges PPP Links Bridge Point-to-point line LAN 1 LAN 2 LAN 3 MAC frames as payload Strip MAC header and trailer and forward payload only (may miss errors in bridge memory) Chapter 4 p.62/69
63 Repeaters, Hubs, Bridges, Switches, Routers and Gateways Application layer Transport layer Application gateway Transport gateway Packet (supplied by network layer) Network layer Router Frame header Packet header TCP header User data CRC Data link layer Physical layer Bridge, switch Repeater, hub Frame (built by data link layer) (a) (b) Chapter 4 p.63/69
64 Hubs, Bridges, and Switches A B C D A B C D Host A B C D Hub Bridge Switch LAN E F G H (a) E F G H (b) E F G H (c) Cutthrough switches Chapter 4 p.64/69
65 Routers and Gateways Routers operate at the network layer strip off MAC header and trailer use destination address (e.g., IP) address in network header for routing Transport gateways connect networks using different transport protocols (e.g., TCP and ATM) Application gateways, e.g., to SMS messages Chapter 4 p.65/69
66 Virtual LANs Physical Topology may not match the logical organization Security, Load, Broadcast Cable duct Hub Corridor Switch Hub Twisted pair to a hub Office Chapter 4 p.66/69
67 Example VLANs Port versus MAC versus protocol or IP A B C D A B C D G W W W I J K G GW M I G N J G W B1 B2 S1 S2 GW G GW O K W W W M N O L GW L G 2 E F G H G W G G E F G H (a) (b) Chapter 4 p.67/69
68 802.1Q Being VLAN Aware Transition VLAN-aware end domain VLAN-aware core domain Legacy end domain Legacy PC Tagged frame Tagged frame VLAN- aware PC VLAN-aware switch Switching done using tags Legacy frame Chapter 4 p.68/69
69 802.1Q Frame Format Destination Source Length Data Pad address address Check- sum Destination Source 802.1Q Tag Length Data Pad address address Check- sum VLAN protocol ID (0x8100) Pri C F I VLAN Identifier Chapter 4 p.69/69
Medium Access Control Sublayer
Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA
More informationChapter 4. The Medium Access Control Sublayer
Chapter 4 The Medium Access Control Sublayer The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and
More informationChapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.
Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.
More informationOutline. EEC-484/584 Computer Networks. Multiple Access Protocols. Wireless LAN Protocols. Lecture 9. Wenbing Zhao
EEC-484/584 Computer Networks Lecture 9 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline Review Multiple access protocols IEEE 802
More informationEEC-484/584 Computer Networks
EEC-484/584 Computer Networks Lecture 9 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review Multiple access protocols IEEE 802
More informationOutline. EEC-682/782 Computer Networks I. Multiple Access Protocols. IEEE 802 Standards
EEC-682/782 Computer Networks I Lecture 9 Wenbing Zhao w.zhao1@csuohio.edu http://academic.csuohio.edu/zhao_w/teaching/eec682.htm (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB
More informationComputer Networks Medium Access Control. Mostafa Salehi Fall 2008
Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically
More informationHigh Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols
High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:
More informationJaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation
Broadcast Network Jaringan Komputer Medium Access Control Sublayer 2 network categories: point-to-point connections broadcast channels Key issue in broadcast network: how to determine who gets to use the
More informationComputer Networks. Medium Access Sublayer (Part I)
Computer Networks Medium Access Sublayer (Part I) Topics Introduction Multiple Access Protocols Ethernet Wireless LAN Protocols Bridges Misc (brief) High-Speed LANs Satellite Networks Introduction Remember,
More informationEE 122: Ethernet and
EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts
More informationThe Medium Access Control Sublayer
The Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Static channel allocation Assumptions for dynamic Assumptions for Dynamic Channel Allocation 1. Independent traffic 2. Single channel
More informationRedes de Computadores. Medium Access Control
Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium
More informationGetting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg
Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing
More informationWireless Communications
4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationMedium Access Control Sublayer Chapter 4
Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth RFID Data Link Layer Switching Revised: August 2011 & February
More informationMedium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology
Medium Access Control CSCI370 Lecture 5 Michael Hutt New York Institute of Technology The Data Link Layer Logical Link Control (LLC) IEEE 802.2 Standard RFC 1042 Provides three service options Unreliable
More informationChapter 12 Multiple Access 12.1
Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.
More informationECEN 5032 Data Networks Medium Access Control Sublayer
ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:
More informationTopics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:
1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies
More informationMedium Access Control Sublayer Chapter 4
Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth RFID Data Link Layer Switching Revised: August 2011 The
More informationWireless Local Area Networks. Networks: Wireless LANs 1
Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application
More informationDirect Link Communication II: Wired Media. Multi-Access Communication
Direct Link Communication II: Wired Media Multi-Access Communication Two classes: contention-based e.g., CSMA/CD, CSMA/CA used in Ethernet, WLAN contention-free e.g., TDM, FDM, TDMA, CDMA, token ring one
More informationCS 43: Computer Networks. 27: Media Access Contd. December 3, 2018
CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently
More informationCS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017
CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,
More informationLinks Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame
Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared
More informationPart3. Local Area Networks (LAN)
Part3 Local Area Networks (LAN) LAN Characteristics Small geographical area Relatively high data rate Single management Topologies Bus, star, ring Specifications at physical and data link layer mostly
More informationCSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 5. February 12 CMSC417 Set 5 1
CSMC 417 Computer Networks Prof. Ashok K Agrawala 2012 Ashok Agrawala Set 5 February 12 CMSC417 Set 5 1 The Medium Access Control Sublayer February 12 CMSC417 Set 5 2 Medium Access Control Sublayer Channel
More informationCOS 140: Foundations of Computer Science
COS 140: Foundations of Computer Science ALOHA Network Protocol Family Fall 2017 Homework 2 Introduction 3 Network Protocols.......................................................... 3 Problem.................................................................
More informationChapter 4 (Week 7) The Medium Access Control Sublayer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP CN&DC Dr.
Chapter 4 (Week 7) The Medium Access Control Sublayer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 247-292 1 4.1. THE CHANNEL ALLOCATION PROBLEM 4.2. MULTIPLE ACCESS PROTOCOLS 4.3. ETHERNET
More informationSummary of MAC protocols
Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,
More informationNetworking Technologies and Applications
Networking Technologies and Applications Rolland Vida BME TMIT September 23, 2016 Aloha Advantages: Different size packets No need for synchronization Simple operation If low upstream traffic, the solution
More informationData and Computer Communications. Chapter 13 Wireless LANs
Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer
More informationLANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed
Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed With relatively small bit errors Multiaccess Protocols Communication among
More informationEthernet Basics. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers
Ethernet Basics based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers Ethernet Basics History Ethernet Frames CSMA/CD Obsolete versions 10Mbps versions Segments Spanning Tree Protocol
More informationMedium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols
Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the
More informationLecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,
More informationData and Computer Communications
Data and Computer Communications Chapter 16 High Speed LANs Eighth Edition by William Stallings Why High Speed LANs? speed and power of PCs has risen graphics-intensive applications and GUIs see LANs as
More informationIntroductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.
Introductory to Computer Networks Local Area Networks Lecture 16 Fall 2010 Isfahan University of technology Dr. Faramarz Hendessi What is a LAN? Local area means: Private ownership freedom from regulatory
More informationMedium Access Protocols
Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning
More informationLink Layer and Ethernet
Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple
More informationWireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1
Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices
More informationLecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 5 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,
More informationLink Layer: Retransmissions
Link Layer: Retransmissions Context on Reliability Where in the stack should we place reliability functions? Application Transport Network Link Physical CSE 461 University of Washington 2 Context on Reliability
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Spring'15 1 Next week Announcements April 14: ICN (Spencer Sevilla) April 16: DTN
More informationUnit 7 Media Access Control (MAC)
Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC
More informationCOS 140: Foundations of Computer Science
COS 140: Foundations of C S Network Protocol Family Fall 2017 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 25 Homework Homework Slides, book Chapter 24 on line Homework: All exercises
More informationData Link Layer, Part 3 Medium Access Control. Preface
Data Link Layer, Part 3 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable
More informationRMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN
RMIT University Data Communication and Net-Centric Computing COSC 1111/2061/1110 Medium Access Control Methods & LAN Technology Slide 1 Lecture Overview During this lecture, we will Look at several Multiple
More informationEthernet. Typical Setup. Names. Operations. Operations Switch: No Collisions EECS 122. Hub: Single Collision Domain
Overview Physical Layer MAC Bridged VLAN Link Aggregation XON/XOFF 802.11 Summary Overview Typical Setup Names Operations Perspective TOC TOC Overview Typical Setup Names Structure [rate][modulation][media
More informationData Link Layer, Part 5. Medium Access Control
CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU
More informationLink Layer and Ethernet
Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple
More informationTopics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.
Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,
More informationCSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless
CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer
More informationDirect Link Communication II: Wired Media. Multi-Access Communication
Direct Link Communication II: Wired Media Multi-Access Communication Two classes: contention-based e.g., CSMA/CD, CSMA/CA used in Ethernet, WLAN contention-free e.g., TDM, FDM, TDMA, CDMA, token ring used
More informationEITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst
EITF25 Internet Techniques and Applications L4: Network Access Stefan Höst Repetition The link layer protocol should make sure that the data is correctly transmitted over the physical link using error
More informationCS4516 Advanced Computer Networks. Final Review
Final Review ------------------------------ Final Material Begins Here --------------------------- V. Local Area Networks A. "The Channel Allocation Problem" 1. assumptions B. LAN Performance Notation
More informationTelecommunication Protocols Laboratory Course. Lecture 2
Telecommunication Protocols Laboratory Course Lecture 2 Last time We began our study of telecommunication protocols at the Logical Link Control sub-layer (LLC) LLC issues Connectionless vs connection-oriented
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission
More informationCS 455/555 Intro to Networks and Communications. Link Layer
CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer
More informationIEEE 802 LANs SECTION C
IEEE 802 LANs SECTION C Outline of the Lecture Basic characteristics of LAN Topology Transmission Media MAC IEEE 802 LANs 802.3 - CSMA/CD based (Ethernet) 802.4 Token bus-based 802.5 Token ring-based Comparison
More information4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.
4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data
More informationLecture 4b. Local Area Networks and Bridges
Lecture 4b Local Area Networks and Bridges Ethernet Invented by Boggs and Metcalf in the 1970 s at Xerox Local area networks were needed to connect computers, share files, etc. Thick or Thin Ethernet Cable
More informationDistributed Queue Dual Bus
Distributed Queue Dual Bus IEEE 802.3 to 802.5 protocols are only suited for small LANs. They cannot be used for very large but non-wide area networks. IEEE 802.6 DQDB is designed for MANs It can cover
More informationLesson 2-3: The IEEE x MAC Layer
Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes
More informationLecture 16: QoS and "
Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture
More informationThe Link Layer and LANs. Chapter 6: Link layer and LANs
The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple
More informationData Communications. Data Link Layer Protocols Wireless LANs
Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless
More informationMohamed Khedr.
Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing
More informationEthernet. Computer Networks. Lecture 4.
Ethernet Computer Networks Lecture 4 http://goo.gl/pze5o8 The History of Ethernet Originally: DIX Ethernet (DEC-Intel-Xerox, Ethernet II) - 10Mbps. No LLC sublayer Later standardized as: IEEE 802.3 Frame
More informationCollege of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435
College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435 Student Name ID Time Allowed: 2.0 Hours. Closed Book, Closed
More informationCOMP/ELEC 429/556 Introduction to Computer Networks
COMP/ELEC 429/556 Introduction to Computer Networks Broadcast network access control Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng
More informationChapter 6 Medium Access Control Protocols and Local Area
Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks Chapter Overview Broadcast Networks All information sent to all users No routing
More informationWiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018
WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard
More informationComputer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis
Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted
More informationCSE 461: Multiple Access Networks. This Lecture
CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.
More informationWireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs
Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer 1 Wireless Local Area Networks (WLANs) The proliferation of laptop computers and other mobile devices (PDAs and cell phones)
More informationCSE 461 Multiple Access. David Wetherall
CSE 461 Multiple Access David Wetherall djw@cs.washington.edu How to share a link Multiplexing = networking term for sharing a resource among multiple users (e.g., link, protocol instance) Topics: Multiplexing
More informationReview. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD
Review Error Detection: CRC Multiple access protocols Slotted ALOHA CSMA/CD LAN addresses and ARP Ethernet Some slides are in courtesy of J. Kurose and K. Ross Overview Ethernet Hubs, bridges, and switches
More informationCS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006
CS 123: Lecture 12, LANs, and Ethernet George Varghese October 24, 2006 Selective Reject Modulus failure Example w = 2, Max = 3 0 0 1 3 0 A(1) A(2) 1 0 retransmit A(1) A(2) buffer Case 1 Case 2 reject
More informationGoal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste
Goal and Outline 15-441 15-641 Computer Networking Lecture 3: Packet Switched Networks Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15 441 F16 Goal: gain a basic understanding of how you can build a
More informationstandard. Acknowledgement: Slides borrowed from Richard Y. Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to
More informationCHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College
CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data
More informationComputer Networks. Wireless LANs
Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/
More informationMultiple Access in Cellular and Systems
Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel
More informationChapter 6 Medium Access Control Protocols and Local Area Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks 802.11 Wireless LAN CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Wireless Data Communications Wireless communications compelling
More informationChapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010)
Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010) 6.3.2. Ethernet Ethernet was designed in the 1970s at the Palo Alto Research Center [Metcalfe1976]. The first prototype [5] used a coaxial
More informationIEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall
IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06
More informationOutline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties
Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers
More informationData and Computer Communications. Chapter 11 Local Area Network
Data and Computer Communications Chapter 11 Local Area Network LAN Topologies Refers to the way in which the stations attached to the network are interconnected Bus Topology Used with multipoint medium
More informationCMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16
CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16 1 Final project demo Please do the demo next week to the TAs. So basically you may need
More informationMULTIPLE ACCESS PROTOCOLS 2. 1
MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527
More informationOutline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD
Page 1 Outline 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless Peter Steenkiste Data link fundamentals» And what changes in wireless Aloha Ethernet Wireless-specific
More informationLink Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.
Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple
More informationCS/ECE 439: Wireless Networking. MAC Layer Road to Wireless
CS/ECE 439: Wireless Networking MAC Layer Road to Wireless Multiple Access Media Media access Controlling which frame should be sent over the link next Easy for point-to-point links; half versus full duplex
More informationCSE 461: Wireless Networks
CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network
More informationIEEE standards for local area networks
IEEE standards for local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS Standard for LANs 1 Copyright Quest opera è protetta
More information